From nobody Thu Jul 13 18:59:37 2023 X-Original-To: toolchain@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4R23nQ2x6jz4mZ2k for ; Thu, 13 Jul 2023 18:59:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4R23nQ1x6Wz4Lpw for ; Thu, 13 Jul 2023 18:59:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1689274778; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=SVknLWmjWeRT+zqqTi/H9W9n9BpkLK1lvnSJekyYhIo=; b=KIFaPAK7y+6lwsHtyu/Sxc68a9mAB9ehI9gaH0CbEqtgnweYjwNSe1r1r9vzTPq2xHrrDZ i7gwB2PFeQqGvpIoDoO/+KxjzvYsW/Vz03FqaQEji1zd5faDyNHE/F/+hiY/WmRd11U/ht /ZnD3UU2Eg4bMIr0+XJuOmfogNsD0ryGs0yH+KWxOcpIGRpS2wBsu3YDh2Pv37DlHaqVrq C8FX0/HH94YVu50mAEGfgL0GA8t8DyHm78uQ4y0vWQFXoW43r4u/wypcEJd5wpFUqfEuvc nv3lnCBxy4D9exBhYdTrUIyBksXeS2DOpfheqYxoD6Q3w4kSQSwtth5h5FtSsQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1689274778; a=rsa-sha256; cv=none; b=Gwl++Tb69K53J64N6NRdfLUTb24DniOqCL84xXnSF1cUb6T5MQH5hnjBPk2OnKUPqKg6Ce U7mhvQt1L+6dJLJCFXwsVanyJYsTYgLbs+qno4EzvJAyQ7fK5uIObYrOdso/3AYoJouEks cFJujyt1MQjau8paaYzgOjGbfbDDF9Sp2iIUYxbxXtLV3FFcEHMXG54Yef+KqYJhoDN/sl SNf7TbzT7noKBpbfxLW8O/cltN7BE8qqtoS4V0dGbA1JxZzT1Q4/WZtua6jF1J59MqpkjA JU8zobijOBrxr6RrtbWQQWtEOO4JB01yuzmCCvIRgsBTiGaNpi3m/95DIjPY4g== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4R23nQ0Pp7z12yp for ; Thu, 13 Jul 2023 18:59:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 36DIxcQn044052 for ; Thu, 13 Jul 2023 18:59:38 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 36DIxcLx044051 for toolchain@FreeBSD.org; Thu, 13 Jul 2023 18:59:38 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: toolchain@FreeBSD.org Subject: [Bug 265755] clang crashes on math/octave-forge-interval on amd64 on 14 Date: Thu, 13 Jul 2023 18:59:37 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: misc X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: commit-hook@FreeBSD.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: toolchain@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Maintenance of FreeBSD s integrated toolchain List-Archive: https://lists.freebsd.org/archives/freebsd-toolchain List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-toolchain@freebsd.org X-BeenThere: freebsd-toolchain@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D265755 --- Comment #6 from commit-hook@FreeBSD.org --- A commit in branch main references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=3D1cd9788408aa9ea4fd0fbc3e06bd9a4ea= f8d8d22 commit 1cd9788408aa9ea4fd0fbc3e06bd9a4eaf8d8d22 Author: Dimitry Andric AuthorDate: 2023-07-13 18:57:22 +0000 Commit: Dimitry Andric CommitDate: 2023-07-13 18:57:22 +0000 Merge commit fde5924dcc69 from llvm-project (by Serge Pavlov): [clang] Reset FP options before template instantiation AST nodes that may depend on FP options keep them as a difference relative to the options outside the AST node. At the moment of instantiation the FP options may be different from the default values, defined by command-line option. In such case FP attributes would have unexpected values. For example, the code: template void func_01(int last, C) { func_01(last, int()); } void func_02() { func_01(0, 1); } #pragma STDC FENV_ACCESS ON caused compiler crash, because template instantiation takes place at = the end of translation unit, where pragma STDC FENV_ACCESS is in effect. = As a result, code in the template instantiation would use constrained intrinsics while the function does not have StrictFP attribute. To solve this problem, FP attributes in Sema must be set to default values, defined by command line options. This change resolves https://github.com/llvm/llvm-project/issues/6354= 2. Differential Revision: https://reviews.llvm.org/D154359 Requested by: pkubaj PR: 265755, 265758 MFC after: 1 month contrib/llvm-project/clang/lib/Sema/SemaTemplateInstantiateDecl.cpp | 4 ++= ++ 1 file changed, 4 insertions(+) --=20 You are receiving this mail because: You are the assignee for the bug.=